Sciweavers

1722 search results - page 19 / 345
» Dedication
Sort
View
FPL
2007
Springer
136views Hardware» more  FPL 2007»
15 years 8 months ago
A Load/Store Unit for a Memcpy Hardware Accelerator
Recently, a dedicated hardware accelerator was proposed that works in conjunction with caches found next to modern-day microprocessors, to speedup the commonly utilized memcpy ope...
Stamatis Vassiliadis, Filipa Duarte, Stephan Wong
103
Voted
ICN
2007
Springer
15 years 8 months ago
Bandwidth Scheduling and Path Computation Algorithms for Connection-Oriented Networks
There has been an increasing number of network deployments that provide dedicated connections through on-demand and in-advance scheduling in support of highperformance application...
Sartaj Sahni, Nageshwara Rao, Sanjay Ranka, Yan Li...
CDC
2009
IEEE
136views Control Systems» more  CDC 2009»
15 years 3 months ago
Refined instrumental variable methods for identifying hammerstein models operating in closed loop
This article presents an instrumental variable method dedicated to non-linear Hammerstein systems operating in closed loop. The linear process is a Box
Vincent Laurain, Marion Gilson, Hugues Garnier
APAL
2007
65views more  APAL 2007»
15 years 2 months ago
Increasing the groupwise density number by c.c.c. forcing
We show that ℵ2 ≤ b < g is consistent. This work is dedicated to James Baumgartner on the occasion of his 60th birthday.
Heike Mildenberger, Saharon Shelah
SCN
2008
Springer
141views Communications» more  SCN 2008»
15 years 1 months ago
Improved Privacy of the Tree-Based Hash Protocols Using Physically Unclonable Function
In 2004, Molnar and Wagner introduced a very appealing scheme dedicated to the identification of RFID tags. Their protocol relies on a binary tree of secrets which are shared
Julien Bringer, Hervé Chabanne, Thomas Icar...